You are on page 1of 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/350189316

IT Infrastructure -Business Continuity Plan Implementation and Maintenance

Article in Journal of Information Technology · March 2021

CITATION READS

1 8,628

1 author:

Anshuman Awasthi
Restoration Hardware
18 PUBLICATIONS 9 CITATIONS

SEE PROFILE

All content following this page was uploaded by Anshuman Awasthi on 19 March 2021.

The user has requested enhancement of the downloaded file.


Journal of Information Technology &
Software Engineering Research Article

IT Infrastructure - Business Continuity Plan Implementation and Maintenance


Anshuman Awasthi *
Department of Engineering, Restoration Hardware, USA

ABSTRACT
Business Continuity Planning requires many efforts from cross-functional team members across the organization. If
creating a plan is such a big commitment, maintaining and regular, testing requires even more dedication towards the
initiative. Many organizations invest a lot in creating a plan and documenting the process but sometimes fail to keep
the plan active overtime. Let us review the complex exercise of maintaining and exercising Business Continuity Plan
implementation from an IT Infrastructure perspective.
Keywords: Business; Continuity; Planning; Risk Management; Risk Mitigation; IT Infrastructure Risk Factors;
Business Continuity Implementation

PROBLEM DEFINITION personal computers completely every week, but users can do
How to execute and maintain an effective Business Continuity incremental backups every few days [1].
Plan.
Employee education and training
DISCUSSION Teaching all our staff about proactive defense and safe online
This article explains how to start working on the prerequisites of habits is critical.
a Business Continuity Plan and implement the same. It also "Educating them about what they are doing and why it is
explains some of the aspects of maintaining the plan and how to dangerous is a more effective strategy than expecting your IT
communicate during the crisis. security staff to react to end-users' bad decisions constantly,"
Watchinski says [2]. The company needs to ensure that all
METHODS
employees understand how important our company's data is and
Business Continuity Planning; Risk Management how to ensure data safety in case of a disaster and during normal
operations.
INTRODUCTION
Risk Register
If we need to prepare our organizations' critical business
functions against any disaster, it is essential to invest in a robust The organizations can prepare a risk register based on their
Business Continuity Plan. This initiative requires a lot of corporate /branch office/ Date Center locations, critical
preparedness before we can start documenting the process. Let business functions. Please refer below example of a sample risk
us review some of the major prerequisites. register for an organization.
Regular Backups and data stored at offsite location: If we Name of Descripti Source Likelihoo Severity Controlla
schedule regular backups in the cloud or at least to an external Risk on (with d of of bility*
hard drive, it is a quick method to ensure that all your data is explanati Occurren Impact* (with
stored safely. It is essential to have a backup policy in place. on) ce* (with (with justificati
Servers should have a full back up at least every week and justificati justificati on)
incremental backups every night; we also need to backup on) on)

*Correspondence to: Anshuman Awasthi, Director-Department of Engineering, Restoration Hardware, USA, Tel: 8187514274; E-mail:
anshumanawasti@gmail.com
Received: February 15, 2021; Accepted: March 1, 2021; Published: March 20, 2021
Citation: Awasthi A (2021) Enterprise Network Hardware Refresh. J Inform Tech Softw Eng.11:275.
Copyright: © 2021 Awasthi A. This is an open-access article distributed under the terms of the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

J Inform Tech Softw Eng, Vol.11 Iss.2 No:275 1


Awasthi A

Earthqua Company External- Medium- High- Low-We Fire/Heat Whether External/ Low- High- Low-Fire
ke ’s Earthqua Company Earthqua cannot Damage from Internal- Company Fire/ can be
headquart ke is one headquart ke can control equipmen Overheati is taking overheati controlled
ers are of the ers are cause earthquak t ng of any precautio ng can by having
located natural not inside severe e but just overheati network nary cause fire
near San disaster San and prepare ng, short- equipmen measures significan extinguish
Andreas Andrews disruptio for circuit, t or fire to avoid t damage ers onsite
fault line fault line n business lightning, originated overheati to critical and an
and an but near continuity loss of from an ng of hardware immediat
earthquak to the environm external equipmen equipmen e call to
e can area ental source t’s and is t’s and fire
cause controls, can cause performin will departme
damage to or arson damage. g regular directly nt
corporate fire-drills impact
office and operation
data s
center
Water Whether External/ Medium- High- Low-
Internet Internet External- Medium- High- High-It Damage from Internal- We Water Water
Services services Internet We have Internet can be leaky Water carryout damage damage
outage connectiv chosen a outage at controlled pipes/ damage regular can cause due to
from a ity is well- a critical by roofs or can inspectio severe internal
provider provided known site can agreeing severe happen n of damage to factors
will cause by (ISP) with cause on weather from plumbing company can be
service internet reliable severe aggressive internal infrastruc property controlled
disruptio service network impact to SLAs with pipes or ture and disrupt but we
n as site provider(I infrastruc operation ISPs and from drainage company have very
operation SP) on ture. s as installed external system to operation limited
s depends their own important network factors avoid s and can control
heavily on network resources circuits like severe occurrenc cause loss on water
internet are from weather e of damage
connectiv available multiple revenue caused by
ity on vendors external
network factors.

Power At a External- Low- High-We Medium- Product Compani External- Medium- High- Medium-
Outages facility or Power is Power depend It can be Supply es makes Vendors Company Supply Company
across a provided outages heavily on controlled profit on located in had varies chain is a has a very
power by are not network by use of sold different vendors critical limited
grid external common and IT uninterru products. countries located in function control
companie in area resources ptible If there is manufact different of a retail on
s to run power any ure most countries organizati external
operation supply(U impact to of the on and factors
s which PS) and the products any effecting
will need generator product overseas. disruptio product
power to s supply it Vendor n in suppliers
function directly financial product in
affects stability ,p supply different
Hardware Due to Internal- Low-We Medium- Medium- companie olitical will have countries
Failures normal Hardware have Impact We have s business unrest in direct
wear and failures in installed can be installed and their effect on
tear, network hardware minimize redundan reputatio home revenues
facility equipmen supplied d by t servers n country
damage, t’s, servers by a well- running for all will affect
or human and known servers in critical product
error storage vendor high applicatio supply
are and they availabilit ns
common guarantee y
Table 1: Risk register.
and can their environm
happen performa ent
due to nce DISRUPTION SECURITY MEASURES
normal The Basic System Security Measures should apply to all systems
wear and at an organizational level, regardless of the level of their system
tear
type. It is a critical baseline, which all systems must meet. Please

J Inform Tech Softw Eng, Vol.11 Iss.2 No:275 2


Awasthi A

refer to below security measures, which can be applied even in often considered the most reliable during weather or power
case of a disaster. emergency, and the vast call volume can cause strain on the
mobile network, making calls difficult [7].
Accountability and audit To overcome this obstacle, an organization's crisis
Enable process accounting or auditing: Enable process communication plan should include various methods to reach
accounting or auditing that can generate an information log its key stakeholders, such as:
about how the new processes are created and their log activity. • Emails, text messaging,
Audit change in privilege or privilege escalation: Whenever a • Social media outlets (Facebook, Twitter, LinkedIn, etc.),
user changes his level of privilege, a log should be generated to • A business telephone hotline with recorded messages with the
record that. capability of allowing the caller to leave voice messages,
• Intranet site or a business' website or a third-party emergency
Audit firewall denial: When the host or a zone-based firewall notification system.
denies any network communication system should generate a
log. An organization needs to understand that a business' crisis
communication goal should be to provide accurate, timely, and
Audit all critical application events: It is essential to log all precise information to prevent inaccuracies and rumors. If we
critical application events. want to accomplish this objective, our BCP communication
Dedicated Syslog system: System logs must be written to a should include a message containing the following verified
remote system in such a way that any user on the system being information that will be sent to all stakeholders as soon as
logged cannot alter them [3]. possible after a disruption has occurred:
• When what, and where disruption has occurred
Configuration and maintenance • How critical the problem appears as of now
Follow advanced vendor security recommendations: Conform • How the business operations have been impacted (e.g.,
to guidance and best practices as per the vendor's security damage to operations and facilities)
documentation and whitepapers. Additional information should be sent to employees, including:
Network-based firewalls and Host-based: Systems must be • Who is expected to report to work
protected by both a network-based and a host-based -firewall that • Where and when to report to work
allows only those limited incoming network connections • Where to direct questions
required to fulfill the business need. • When more details will be available
Change management process: Configuration changes must be All communications will be tailored to the recipient,
regulated by a documented change and configuration considering what they may experience because of the disaster. It
management process. helps to maintain the business's good reputation, and it also
Partitioning: Systems may share resources and hardware only provides practical information regarding where and when the
with other systems that have similar security requirements, business will be "open for business."
regardless of their criticality classification. Systems that share the The company can use a template as the one shared below to
same security requirements have user communities of similar send a message to its employees:
size and character, identical firewall profiles, and same technical
specifications [4]. PREPARED MESSAGE TO EMPLOYEES
[Template]
Access control: No system or person should be given access to
the critical systems unless it is required for business purposes. First notice
Sharing: Critical data will not be shared with any unauthorized A severe storm has developed over [area] and is estimated to
application. If an application needs access to data that requests continue through [time] am/pm. Please relay this information to
need to be approved by change advisory board all affected individuals in your department/work area, including
Retention: Critical data should only be stored for as long as is any onsite visitors.
necessary to accomplish the documented business process [5].
Notice of delayed opening
Physical access: Due to the current weather conditions, the --- corporate
The system must reside in a secured, managed data-center. office will have a delayed opening on [date]. The office will open
at [time] am/pm. Please call [contact name/phone] or check the
COMMUNICATION PLAN website www.organizationwebsite.com to verify the status of the
office prior to your commute.
It can be very challenging to communicate during a major
disaster. It can be almost impossible, as thousands of people
attempt to reach families and friends and to ensure their safety
or inform on their situation [6]. Cellular communications are

J Inform Tech Softw Eng, Vol.11 Iss.2 No:275 3


Awasthi A

Notice of closure a landline, email, cellphone, text message, or another type of


listed communication in the process.
The [business name] will be closed [date] due to the severe
storm. Those employees who are expected to report to work will In case of an incident, the call tree is initiated once the Disaster
be notified. It is anticipated that the [business name] will Recovery team has completed their assessment and determined
reopen [date], depending on conditions. As more information is that employees must be notified. Only designated employees can
available, we will contact you by [phone/email/ launch the emergency call tree once it approved by an
text] by [time] am/pm. Please call [phone] or check the authorized leader.
website [URL] to verify the status of the office prior to your As the call tree progresses, incident response team members take
commute. Optional: Employees who were scheduled for work notes on people they cannot contact, as the data must be
today will receive their regular full day wages according to their conveyed back to the Disaster Recovery team for further follow-
normal work schedule. up. To ensure calls were completed as planned, the last person
on the call tree list should confirm receipt of the final call to an
Notice of re-opening employee. The company also has a communication list manager
The corporate office will reopen [date]. Those scheduled to work to monitor responses and contact backup staff as necessary.
are expected to report to work at their designated starting time. Once the entire call tree has been notified, other business
However, we do not expect any employee to take unreasonable continuity plan procedures can proceed. Call tree benefits
risks attempting to report for work. Each employee must observe include human interaction, the ability to relay important
conditions in his/her own area and determine whether information, and the creation of a comprehensive list of
aftermath conditions or circumstances will make the trip unduly stakeholder's contact information.
hazardous. You must notify your supervisor as soon as possible,
if you will be unable to report to work or if you will arrive late
[8]

Stakeholder communications
Information management and communication should be a part
of planned design and execution and should be integral to the
organization's risk and disaster management plans. The
improvised conversations can be costly and have unsatisfactory
results.
During an emergency, timely and transparent production and
dissemination of information generate trust and credibility [9].
All stakeholders involved will demand information in the form
of data, figures, reports, and situation analysis or
Figure 1: Call Tree.
recommendations. These stakeholders depend on this
information to guide their work and to translate their interest During an incident, the call tree is initiated once the emergency
and concern into concrete action. management team has completed its assessment and determined
that employees must be notified. Only designated employee can
The company can use a call tree to communicate with all
launch the emergency call tree once it approved by authorized
stakeholders. A call tree is a layered structured communication
leader. As the call tree progresses, incident response team
model that can be used to notify defines individuals in case of
members take notes on people they cannot reach, as that data
an event -- typically unplanned -- and coordinate the process of
must be relayed back to the emergency team for follow-up.
recovery if required. A call tree is also referred to as a phone
tree, call list, phone chain, or text chain [10]. To ensure calls were completed as planned, the last person on
the list should confirm receipt of the final call to a designated
The organization's IT and business functions can create their
employee. Company also has a communication list manager to
call tree coordinates data gathering with their HR (Human
monitor responses and contact backup staff as necessary. Once
Resources), as contact data typically comes from that
the entire call tree has been notified, other business continuity
department usually. Each listed staff may have several contacts,
plan procedures can proceed. Call tree benefits include human
including home, office, and cell phone numbers, and an email
interaction, the ability to relay important information and the
address. The emergency management team and company
creation of a comprehensive list of stakeholder’s contact
management then approve the list of contacts, and sequence of
information [11].
notification. The emergency call tree is available in several
locations-such as the company intranet and in hard-copy format. The company can follow below communication methods
beyond automated call tree procedure
Call trees play an essential role in our disaster recovery plan.
Call tree execution should be automated with the help of any • Conference calls
application and that software can contact all stakeholders using • Person-to-person communication
• Website notification

J Inform Tech Softw Eng, Vol.11 Iss.2 No:275 4


Awasthi A

• Dedicated Message center Word Financials RPO and RTO:4 Hrs< RPO< 24
• Customer notification Hrs and RTO 48 Hrs
• Progress reporting
• Employee reporting Email & Black Berry (Note: Email/Black Berry no data
• Text-to-speech messaging (Independent apps no Dev/QA) would be replicated from
production environment, only
RESTORATION OF OPERATIONS identified VVIP users mailbox
will be created at alternate
If an office facility is damaged or production equipment breaks recovery site during the Disaster
down, information technology is disrupted, business is Situation)
impacted, or a supplier fails to deliver or and the financial losses
are beginning to increase. The organization recovery plans are Table 2: Application Strategy 1.
alternate means to restore critical business operations to a
minimum level that can be acceptable following a business Applications Environment Not Meeting Business Strategy
disruption, and they can be prioritized by the Recovery Time
Objectives (RTO) decide during the BIA (Business Impact Application having Production environment in Primary and Dev/QA
Analysis). environment in alternate location-Primary or any other site (other
than Primary Location)
Recovery strategies require resources, including facilities, people,
and equipment, materials, and information technology. Applications Strategy
Company Operations can be relocated to its alternate site in a
different city in case of any disaster affecting their primary Atlantic Royalties Replication Solution: Tape Based
Replication Solution
location - assuming the same outage does not affect both. This
method also believes that the surviving site has the capacity and Compute: Existing Dev/QA
resources to perform the allocated work of the site that is environment will be utilized
affected. Prioritization of service levels or production, providing
additional support and staff, and other action items that would WBR Royalties Core Infrastructure &
be needed in case of capacity issues at the other site. Company Application: Existing
staff can work from home through remote connectivity [12]. Infrastructure will be leveraged

The organization should identify its critical applications, and SMART RPO and RTO:24 Hrs< RPO <
they are categorized into two sections; 48 Hrs and RTO 48 Hrs
a) Applications met strategic guidelines; Applications that are
Applications having Production and Dev/QA environment in same
having Development and QA environment on a designated location
alternate location other than production [13].
b) Apps do not meet strategic guidelines; Applications that are Applications Strategy
having Production, Development, and QA environment in the
Core Financials Replication Solution: Tape Based
same Data Centre (DC) [14].
Replication Solution

DR Solution Strategy High Level Overview of identified Compute: Back-to-Back


business critical applications Agreement with the Third Party
Vendor to supply required
Applications Environment Meeting Business Strategy compute resources within agreed
SLA’s.
Applications having Production in Primary DC or Secondary DC and
corresponding Dev/QA environment in alternate location-Primary Core Infrastructure &
for Secondary DC and vice-versa Application: Existing
Infrastructure will be leveraged
Applications Strategy
RPO and RTO:24 Hrs< RPO <
SAP Financial Replication Solution: VTL Based 48 Hrs and 24 Hrs< RTO < 120
Replication/Oracle Data Guard Hrs

System Enterprise Services (ESS) Compute: Existing Dev/QA


Table 3: Application Strategy 2.
environment will be utilized
An example of an Organization’s disaster recovery solution
Oracle AR Core Infrastructure & strategy
Application: Existing
Infrastructure will be leveraged Compute: Development/QA environment compute resources
would be utilized during the disaster situation. Existing Dev/QA

J Inform Tech Softw Eng, Vol.11 Iss.2 No:275 5


Awasthi A

operating system instances would be required to shutdown with HTML-based JSP applications or through a Java applet in a Web
necessary precautions before recovery of the production browser for the traditional Forms-based interface.
environment on identified servers [15].
Word financials: Word Entertainment is a data store of outdoor
Operating system: Recovery location side operating system can furnishing. The WORD system has been set up mainly for the
be kept in sync with the production environment using VTL Order-To-Cash functionality. The application can be accessed
based replication. through a user interface, which is provided in two ways:
HyperText Markup Language (HTML) for the newer HTML-
Database: The production environment would be required to
based (Java Script)JSP applications or through a Java applet in a
configure as Primary Database with archive mode on. Recovery
Web browser for the old Forms-based interface [18].
location Database would need to be configured as a standby
database, and Archives logs would be shipped to a remote Word Financials interfaces with various application systems, like
location at regular frequency using automated scripts/Oracle EDI-Gentrans, Oracle AR, Diamond, WEA, Etrans, Warehouse
Data Guard. These archive logs would be applied at regular System, and SAP. Word Financials environment uses tools like
intervals to sync up the standby database with the primary Toad and/or SQL Navigator and Go Global-to connect to
database. UNIX.
File system: Any file system, which is required to be available at
IMPLEMENTATION OF THE BCP
recovery location need to be replicated using VTL based
replication. We can assume that catastrophic events may have a minimal
probability, the organizations that plan carefully for their
Core infrastructure: Active Directory & DNS can serve from an business continuity are the ones that may stand the best chance
alternate location in case of any disaster declared [16]. Citrix of continuing their essential business functions in case of a
environment is running as a single Citrix Farm with multiple disaster. It does not take a monumental disaster to disrupt the
zones that are serving respective areas; client application daily operations of a business. Occasionally it can occur due to a
software that is installed and published using Citrix would need power outage or intermediate interruptions that result from an
to be installed and released from another zone. attack instigated by cybercriminals or from a storm [19]
Network infrastructure: Core network infrastructure is already The organization needs to understand that having a Disaster
established in Primary and Secondary DC's, System ESS uses Recovery Plan in place means arranging to continue to deliver
the same resources for user access. Internal stores network users essential services that are required to run business operations
are considered as trusted user’s equivalent to Local Area and identifying the necessary resources, which are vital to
Network (LAN) users, so there is no firewall for Stores support business continuity. If we want our business continuity
environment. The organizations Virtual Private Network (VPN) plan to be effective, the leadership team needs to work on below
users that are accessing this application through SecondaryVPN, key critical components that must be present during the
in case of unavailability of primary VPN, users can select planning process.
alternate available VPN servers to connect to the organization's
private network.
Business continuity planning organization
User redirection: All users will be redirected to the Recovery
When an organization starts the process of BCP, a senior
location automatically. During the disaster situation, the
management team is required to oversee the whole process,
Citrix/AD/DNS environment of New Jersey location will
which includes initiating the necessary steps, designating the
redirect the end users' requests to the secondary System
resources, planning for implementation, and then continue
enterprise services environment [17].
auditing and testing the business continuity plan[18]. The senior
Oracle AR: The Standalone Oracle AR module is implemented management committee creates the teams required responsible
mainly as a cash application. There are a high number of custom for developing and executing the business continuity plan, will
forms and functions registered in Oracle AR. The Descriptive approve the planning structure, identifies the roles of specific
Flex Fields (DFF), Standard flex fields available with Oracle are individuals, and prioritizes critical business operations.
also used to capture data such as information coming from
Legacy systems, Collector Information, Custom Notes, etc. that Business impact analysis
needs to flow to the downstream systems and also from the data
that needs to flow from other systems to Oracle. Reconciliation By performing a Business Impact Analysis, an organization can
and reporting are carried out using customized reports that identify essential business functions on both the external and
generally are run during month-end for checks and internal levels. The identification of these business functions
reconciliation. These are mainly aging reports and customer initiates prioritization of services to ensure ongoing delivery and
balance reports. fast recovery following a disruption.

Let us say that the organization's staff logs in to Oracle Business Impact Analysis should also include an assessment of
Applications through the E-Business Suite Home Page that is the impact a disruption can have on the service delivery model
accessible using a desktop client web browser. The user interface and how long a business can survive without running
is provided in two ways, either through HTML for the newer mandatory business functions. It is also essential to identify the
areas, which contribute the most to the revenue and then

J Inform Tech Softw Eng, Vol.11 Iss.2 No:275 6


Awasthi A

prioritize those business functions to prevent loss of income status of operations. The employees should be equipped with
following a disaster. We need to consider the shareholders and this baseline information, it is essential to reach out to others
the consumers, and when we are doing the BIA (Business based on the nature of the issue the organization is facing (e.g
Impact Analysis) to assess the cost of intangible losses that can length of likely closure damage to the building, financial needs,
be caused by an outage. etc.). In a typical scenario, this should include critical suppliers,
customers, neighboring businesses, utility companies, and
Business continuity detailed response and recovery plan creditors, as well as essential business partners such as financial
institutions and insurance agents.
Following the setup of a leadership committee and the
completion of a Business Impact Analysis, a business continuity The enterprise should understand that for an organization crisis
plan needs to be documented to explain in detail how essential communication goal should be to provide accurate, timely, and
business services will be offered during the period of service correct information in a simple format to prevent inaccuracies
disruption. Each function that is considered critical to the and rumors. To accomplish this objective, our BCP
business operations will be carefully planned in detail. It will communication should include a message containing the
include identification of all possible risks and threats, recovery following verified information that will be sent to all
processes that are already documented and communicated by stakeholders as soon as possible after a disruption has occurred:
the business, and appropriate response to the disaster by the The company can follow the below steps to communicate the
respective teams that are knowledgeable in their area of service Business Continuity plan to all stakeholders involved.
and in case we need to relocate to an alternate space.
Assign a communications coordinator
Training
The company should identify a crisis communication
When the Disaster Recovery plan is in place, we understand it is coordinator. This person will be responsible for communicating
critically necessary to train our workforce on their designated the business continuity plan and developing messaging,
responsibilities in the event of a disruption. In addition to being managing the communications process, and working with the
trained on their specific duties, our workforce should also be business owner or other senior management on preparation and
aware of other cross-functional team functions that are implementation.
associated with their responsibilities. The training will include
several learning exercises that set the stage for the Business
Create message templates
Continuity Plan and prepare our employees for the necessary
actions they should take in the event. It should include the The organization's business continuity planning team should
proper sequencing of tasks and what should be their response to prepare message templates with the information, which is
any external factors that can have an impact on the overall relevant to the necessary stakeholders as per their role [20].
recovery process.
Create an employee emergency card
Quality assurance
The organization should create and distribute a pocketsize
Following the training phase, the organization's recovery Team emergency card or print the information at the back of the
will evaluate the Disaster Recovery plan to find out where employee's identification card, which includes critical
improvements are required and to assess the program for information that may be needed during or immediately after a
effectiveness and accuracy. This process is also referred to as disaster. Many organizations operate primarily as a paperless
quality assurance, and it will be performed both on the external office. Still, they need to understand a small employee
and internal levels to ensure the efficacy in the event of emergency card can be used as a useful resource (even by a few
disruption of services. employees) that should be easy to access if electronic devices are
down.
COMMUNICATION OF THE BCP
An organization should recognize the importance of crisis Use of all available mediums
communication by encouraging practices to obtain and The organization should schedule overview training, update the
maintain vital contact information for their workforce, vendors, intranet website, and will inform all department heads to reach
customers, to ensure communication systems will operate even if out to all the concerned individuals.
the business is closed. The key is hidden in knowing how and
when to communicate essential information to keep those you MONITORING AND TESTING OF THE BCP
rely on, and those who are dependent on you.
An enterprise should understand that it is crucial to have a
The organization's Business Continuity Planning team should business continuity plan because in the event of an outage that
understand that we have multiple stakeholders who should be causes a business shutdown--a fire or flood for example—the
included in a crisis communication plan. That said, the most organization should be able to minimize losses, downtimes, and
critical and immediate targets are employees as to when the the impact on your customers. Once we have developed our
disaster happens, they need to know about damage to their business continuity plan (BCP), it is just as important to test the
workplace facilities like their branch or corporate office and the program. Testing verifies that the method is useful, it helps to

J Inform Tech Softw Eng, Vol.11 Iss.2 No:275 7


Awasthi A

train all the participants and prepares them to perform in a real systems and Incident telephone calls [11]. The incident response
scenario and identifies areas where the plan needs to be team has a detailed checklist to follow during the incident to
strengthened. monitor if the business continuity plan is being executed as per
the policy.
The organization can include below activities to ensure they test
the plan appropriately:
ADJUSTMENT OF THE BCP
• Conduct a plan review at least quarterly. Gather our team of The company should integrate business continuity planning into
key Business Continuity Plan participants--division leaders or every business decision, incorporated plan maintenance in job
department heads--regularly to review the business continuity descriptions, and has assigned responsibility for periodic review
plan. Discuss various sections in the program with a focus on of the plan and perform regular audits and tests.
the discovery of any areas where the project can be
strengthened. Train new managers regarding the method and An organization can appoint as business recovery coordinator
incorporate any further feedback. who will be responsible for ensuring that the BCP plan is up to
• Conduct disaster role-playing ("table-top") sessions that allow date. The Recovery teams, in turn, are performing their
plan participants to "walk through" the facets of the BCP, responsibility of updating, reviewing, and different sections of
gaining familiarity with their assigned responsibilities in the the program and any associated related materials. The recovery
specific emergency scenario(s). It is essential to perform a dry- management team is also responsible for the incident
run training to document errors and identify inconsistencies management procedures and overall plan coverage, making sure
for correction and improvements. Schedule at least two to the plan addresses any new risks as changes to the company, and
three of these sessions each year. its operations take place
• Perform a dry run of a possible outage scenario. Include The organization should update the business quarterly and get
business partners, leaders, vendors, management, and staff in the updates applied to the plan, and the revision history is
the BCP test simulation. Test data recovery, staff safety, asset updated to record the changes. To keep the plan current, an
management, leadership response, relocation protocols, and active program of testing or exercising is followed as listed below,
loss recovery process. Plan a complete simulation testing at and inputs received post review exercises help to keep the plan
least once a year with realistic but different scenarios that test up to date.
the effectiveness of our documented process.
• An organization should account for any work interruptions • The company should conduct a plan review at least quarterly.
caused by the testing of the disaster recovery plan by Gather the team of key business continuity plan participants--
scheduling simulations and other exercises like dry runs and division leaders or department heads--regularly to review the
limited testing, possibly on weekends. Conduct tabletop business continuity plan. Discuss the elements of the project
sessions that include higher-level staff and management with a focus on the discovery of any areas where the program
exclusively between Saturdays-Sundays, and plan for all the can be strengthened. Train new managers regarding the policy
review meetings usually lasting between two to four hours that and incorporate any further feedback.
can be scheduled during the regular working hours. • The company conducts disaster role-playing ("table-top")
• Communicate the benefits and importance of the Business sessions that allow plan participants to "walk through" the
Continuity plan to all levels of the workforce. Promote the facets of the BCP, gaining familiarity with their responsibilities
review and active participation in the BCP simulation. Use given a specific emergency scenario(s). Conduct the dry-run
the simulation to identify competencies within our workforce training to document errors and identify inconsistencies for
that may signify additional resources during a disaster correction and improvements. Schedule at least two to three
situation. of these sessions each year.
The organization should monitor all critical incidents by
COMMUNICATION OF CHANGES
establishing an Incident Command System (ICS). The Incident
Command System (ICS) is a modular incident management The primary goal of (BCP) is to restore operations through
system designed for all hazards and levels of incident response predetermined, systematic processes and procedures efficiently.
[15]. This system creates a combination of facilities, equipment, However, to minimize the impacts and rapidly respond to
personnel, procedures, and communications operating within a operational hindrances, companies must ensure business
standardized organizational structure. The use of the Incident continuity communication methods and systems are clearly
Command System at the organization facilitates the company's defined and functional. An organization should understand that
ability to communicate and coordinate response actions with the BCP plan update and its communication is an intricate part
other jurisdictions and external incident response agencies. of any continuity process and the overall preparedness. Effective
and transparent communication channels must remain available
The primary responsibility for monitoring Incident threats and
to assess and relay damage, disseminate information to
events resides with Incident Response teams and facilities.
employees, and coordinate a recovery process. Incomplete
Incident response team serve on a continuous 24/7/365 basis
communication often results in failed business continuity
and is always available to receive Incident communications from
efforts. Disaster Recovery ensures thorough planning, testing,
a variety of official and public sources, including National
and exercising communication procedures within the following,
Warning System, National Weather Service (NWS), State Police,
Fire, and Incident Medical Services Institute communication

J Inform Tech Softw Eng, Vol.11 Iss.2 No:275 8


Awasthi A

four phases for effective business continuity and viability of


critical business operations. REFERENCES

Notification: The notification process begins when relevant 1. Hiles A. The definitive handbook of business continuity management.
changes to the business continuity plan have been made. John Wiley & Sons. 2010.
Appropriate personnel and applicable business unit managers 2. Merna T, Al-Thani FF. Corporate risk management. John Wiley &
are initially notified and updated on changes. The organization's Sons. 2011.
communications policy can instruct the original notification 3. Wilkinson JM, Estes D. New Madrid Seismic Zone:Catastrophic
Planning Initiative. EIIP Virtual Forum. 2009.
format.
4. Harrison C. Blog-The Effects of a Power Outage on a Business.
The person responsible for each critical business process starts 2008.
updating related documents. Necessary continuity information 5. Arvig. Benefits and Bottom Lines on Backups. How to Choose a Data
needs to be maintained and updated as required to ensure all Recovery Solution. 2019.
management and affected personnel can quickly initiate proper 6. Jablokow A. What is Virtual Infrastructure Management. 2018.
actions. 7. Avtech. How To Install Device ManageR. Knowledge Base.

Plan review sessions: Disaster Recovery team conducts a plan 8. Lynch W. The Natural Disaster Ripple Effect. 2018.
review at least quarterly. We gather our team of key Business 9. Gaddum R. Business Continuity and Disaster Recovery in the retails
Continuity Plan participants--division leaders or department sector. International Journal of Retail & Distribution Management.
2002; 30(7).
heads--regularly to review the business continuity plan. Discuss
the elements of the project with a focus on the discovery of any 10. Techrepublic. Disaster recovery and business continuity plan. 2020.
areas where the program can be strengthened. Train new 11. Bernstein C. Disaster Recovery Team. 2019.
managers regarding the policy and incorporate any further 12. Globalscape. Enterprise Data management. Retrieved from. 2018.
feedback. 13. Acxiom. Customer data platforms. Data Management.
Verification: Verification of contact information for personnel, 14. Juliana DG. Data Insider. 2021
continuity supervisors, and external responders should be done 15. Bloomberg. IT spending on rise at financial service firms, survey
periodically. shows. 2007.
Use all available mediums to communicate: Disaster recovery 16. Thrivewpengine. Assured Disaster Time to Recovery. 2017.
team uses multiple mediums to deliver the changes so that 17. Disastersafety. Preparing Your Business for a Severe Weather
information reaches to all the concerned individuals. Emergency. 2020.
18. Gov au. Business Continuity Planning.
CONCLUSION
19. Jensenhughes. Business Continuity Planning During the Coronavirus.
Business Continuity Planning (BCP) requires cross-functional 2020.
team efforts. It is essential to communicate appropriately with 20. Erin Sullivan. What is Business Continuity and why it is important.
all the stakeholders. The communication format should be 2020.
simple and effective. If it is critical to have a BCP, it is even more
important to keep it up to date and perform periodic dry runs
and testing.

J Inform Tech Softw Eng, Vol.11 Iss.2 No:275 9

View publication stats

You might also like